IT in Manufacturing


Increased cyber security through distributed firewall strategy

February 2015 IT in Manufacturing

Industrial networks in production environments can no longer rely on the old concept of ‘Security by Obscurity’. Those who are now looking to disrupt companies or a nation’s day to day operation have discovered that the industrial telemetry and automation networks are soft targets. Government organisations have long been warning about the dangers of cyber attacks and have been issuing guidance on counter measures. The UK government (NCIP), US Department of Homeland Security (NERCIP) and other international governmental bodies are all advocating the use of cyber security countermeasures. The US government takes this so seriously that it is backed by federal law. The industrial environment has been slow to adopt cyber security and has seen it as an expensive option. A good reference document ‘Control Systems Cyber Security: Defence in Depth Strategies’ www.inl.gov/technicalpublications/­Documents/3375141.pdf written in 2006 describes in some detail how an in-depth cyber security model should be approached. Some of the points are a little dated now but the message is still clear – without protection networks are vulnerable to attack.

The vulnerability of today’s systems is partly our own fault. The relentless drive to save costs, get away from bespoke industrial busses and vender lock-in, has meant that the natural choice is IP (Internet Protocol). This is the very same communications system that the world now relies on, from ordering a pizza on line to the control of a nuclear reactor. This is not a wrong or poor choice but it does mean that industrial networks now need the same cyber security countermeasures, as we would automatically use on our corporate networks. However, the countermeasures that we now have to consider for industrial networks should go further than normal corporate security. This is due to the distributed topology of the networks and the very often unmanned locations the networks are installed. This is particularly true for utilities with assets spread over a wide geographic area ranging from a single RTU to a complete unmanned water treatment or sub­station installation.

Dealing with a misconception

Good network security is aimed at stopping entry into the network from unauthorised sources – it is NOT a virus protection system. There is no substitute for up-to-date anti-virus software on the client and host machines. Most viruses and malware infect systems after legitimate entry has been gained. The intrusion is invited by simply clicking the OK button to download something off the Internet without considering the consequences or by using portable media such as a USB memory device.

A well configured distributed firewall system will offer some protection against the spread of a virus, as the vectors or protocols the virus hides within will not pass though the firewall unless the protocol is specifically allowed. The firewall will act like an isolation ward in a hospital it will stop the spread of the infection but will not cure the patient.

Network security

The traditional view of how a firewall should be applied is to place the firewall between the industrial network and the scada system or interface to the administrative network. This is not a wrong approach. The industrial/automation network should always be protected from any problems on the administration network whether malicious or otherwise.

The application of one big high availability firewall between the networks is good practice, but is not the whole answer. This approach does leave the industrial network vulnerable to attack or accidental damage. A more comprehensive approach is to place a firewall at every junction of the network. This sounds like overkill but this is the way that enterprise or office networks are protected.

Consider the network you are probably connected to at the moment. This will comprise of a large Internet facing firewall, firewalls at satellite or branch offices as well as server, laptop and desktop machines on the network all with their own firewall. On a large LAN it is not unusual to find firewalls between departments and floors of a building.

Until recently this has been an expensive option for industrial networks as most of the industrial firewalls have been discrete standalone devices and often fitted as an afterthought. If we were to implement a true in-depth security model using this technology the cost would soon get to the point of being prohibitive. Consider the number of network nodes on a large manufacturing complex such as a chemical plant or distributed down the side of a railway track.

The industrial switch/router market is now addressing this issue by including cyber security countermeasures as part of the network switch operating system. The Westermo WeOS operating system has from the beginning included a suite of cyber security features that go far beyond just adding a firewall. It is beyond the scope of this particular white paper to cover all the cyber security features of WeOS.

The application of a distributed firewall does mean that causal hacker or those with a more sinister objective will find it difficult to gain entry to any part of the industrial network and carry out their planned attack. A distributed firewall in effect puts barrier after barrier of tightly controlled access right out to the edge of the network. So even if physical access is gained to a switch on the industrial LAN access will be limited to just the IP addresses, protocol, and ports the firewall rules will allow to pass though the physical port to the rest of the network.

How does this make it difficult for the hacker to access the network?

To understand this we need to look at the way IP communications works at a fundamental level i.e IP address, protocol and port. The IP address is the 4 octet address used in IPV4 to address the devices on the network i.e. 192.168.0.99. The protocol and port number are not normally visible but are part of the way IP communications select which interface the communications are destined for, but it is beyond the scope of this white paper to list all the official port assignments and protocols.

The ability to control or filter the traffic using both IP addresses and ports is important when limiting the extent of any access to the network e.g. if the physical port being accessed will only allow Modbus IP traffic on Port 502 it will not be possible to try and access the Telnet port of a device and change its configuration, for instance. Some protocols use two or more ports to communicate. WeOS allows for this by providing a list of protocols that are known to use multiple ports.

Ideally a distributed firewall cyber security system should be designed into the network from the start. When designing the security system, consideration should be given to the commissioning phase. If the security level is raised too soon during commissioning the whole commissioning process can be halted and the plant or process misses its deadline for completion. Security appliances like the Westermo WeOS operating system allow for this by letting the users run with no security and allow the staged implementation switch by switch on the network until the desired security level has been reached.

By distributing firewalls around the whole system we also realise some other benefits. Typically a high availability central firewall has a huge bandwidth able to process packets at or near full wire speed. There would be no point putting in a firewall on a gigabit network that could only support a fraction of that speed when processing packets through the firewall. On an industrial network we can use switches and routers equipped with firewalls at many locations. Each switch such as the Westermo Lynx or Redfox will be able to process the packets locally and therefore do not need huge amounts of processing power at each of the locations. The aggregate processing power of all Lynx or Redfox L3 switches is far in excess of the maximum bandwidth available on the interconnecting backbone network.

The distribution of the firewall also brings a second benefit, that of resilience or redundancy within the network. By distributing the firewall around the system any failure or breach of security remains local. The rest of the system will remain connected assuming there are backup pathways though the networks.

Conclusion

The cyber security threats to industrial networks are present here and now and cannot be ignored. The trend will be to increase the level of cyber security from the boardroom through to the RTU in the middle of a remote field. The tools to address this issue are becoming more widely available and more importantly integrated into the industrial switches and routers that are used to create the industrial networks. Using a distributed strategy means that the security can be pushed out to the very edge of the network and there is less reliance on large centralised firewalls. Attacks can be stopped at the very edge of the network rather than having to deal with the problem once the intruder has reached the centre.

For more information contact Bob Petrie, Throughput Technologies, +27 (0)11 705 2497, [email protected], www.throughput.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Next-generation road-legal race car.
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced that Briggs Automotive Company (BAC) will move to the Siemens Xcelerator portfolio of industry software and use it to develop the next generation of its single-seater road-legal race car, Mono.

Read more...
Cybersecurity at a crossroads
IT in Manufacturing
here’s a growing unease in boardrooms, data centres and cabinet offices across South Africa. It’s not just about economic headwinds or political uncertainty, it’s about something quieter, more technical and yet just as dangerous - the rising tide of cyber threats.

Read more...
Enabling a sustainable industrial organisation
IT in Manufacturing
This article explains the top sustainability trends and key actions that you can leverage to become a more sustainable organisation.

Read more...
Navigating discrete manufacturing in South Africa through digitalisation
IT in Manufacturing
South Africa’s discrete manufacturing sector faces mounting pressure from global competition, fragmented supply chains and outdated infrastructure. In this complex environment, digitalisation is a critical lever for survival, resilience and growth.

Read more...
Africa’s pragmatic approach to AI and how data centres are enabling it
Schneider Electric South Africa IT in Manufacturing
In Africa, the current AI momentum is driven by a fundamental need, building a resilient digital infrastructure that addresses the real-world challenges of the continent’s communities.

Read more...
World first simulation of error-correctable quantum computers
IT in Manufacturing
Quantum computers still face a major hurdle on their pathway to practical use cases, their limited ability to correct the arising computational errors. In a world first, researchers from Chalmers University of Technology in Sweden have unveiled a method for simulating specific types of error-corrected quantum computations.

Read more...
Platform to accelerate supply chain decarbonisation
Schneider Electric South Africa IT in Manufacturing
Schneider Electric has launched Zeigo Hub by Schneider Electric, a powerful new digital platform designed to help organisations decarbonise their supply chains at scale.

Read more...
Future-ready data centres
IT in Manufacturing
The white paper ‘Future-Ready Data Centres’ by Black & Veatch outlines how integrating sustainable design principles not only helps meet ESG goals but also ensures reliability, operational efficiency and business continuity in the face of climate change and growing digital demand.

Read more...
Sustainable energy management
Siemens South Africa IT in Manufacturing
Utilising its innovative ONE approach technology, Siemens provides complete transparency on resource consumption and offers data-driven optimisation recommendations for sustainable energy management.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved